Security Games for Node Localization through Verifiable Multilateration

Most applications of wireless sensor networks (WSNs) rely on data about the positions of sensor nodes, which are not necessarily known beforehand. Several localization approaches have been proposed but most of them omit to consider that WSNs could be deployed in adversarial settings, where hostile nodes under the control of an attacker coexist with faithful ones. Verifiable multilateration (VM) was proposed to cope with this problem by leveraging on a set of trusted landmark nodes that act as verifiers. Although VM is able to recognize reliable localization measures, it allows for regions of undecided positions that can amount to the 40 percent of the monitored area. We studied the properties of VM as a noncooperative two-player game where the first player employs a number of verifiers to do VM computations and the second player controls a malicious node. The verifiers aim at securely localizing malicious nodes, while malicious nodes strive to masquerade as unknown and to pretend false positions. Thanks to game theory, the potentialities of VM are analyzed with the aim of improving the defender's strategy. We found that the best placement for verifiers is an equilateral triangle with edge equal to the power range R, and maximum deception in the undecided region is approximately 0.27R. Moreover, we characterizedâin terms of the probability of choosing an unknown node to examine furtherâthe strategies of the players.

[1]  M. M. Flood THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .

[2]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[3]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[4]  Branislav Bosanský,et al.  Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.

[5]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[6]  Kung Yao,et al.  Source localization and beamforming , 2002, IEEE Signal Process. Mag..

[7]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[8]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[9]  Mattia Monga,et al.  Localization security in Wireless Sensor Networks as a non-cooperative game , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.

[10]  Amit Grover,et al.  Survey on Wireless Sensor Network , 2016 .

[11]  David Evans,et al.  Localization for mobile sensor networks , 2004, MobiCom '04.

[12]  Fei Yu,et al.  A Survey of Game Theory in Wireless Sensor Networks Security , 2011, J. Networks.

[13]  Afrand Agah,et al.  Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..

[14]  Nicola Basilico,et al.  Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.

[15]  E. Rowland Theory of Games and Economic Behavior , 1946, Nature.

[16]  Alan Washburn,et al.  Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..

[17]  Vincent Conitzer,et al.  Mixed-Integer Programming Methods for Finding Nash Equilibria , 2005, AAAI.

[18]  M. Fewell Area of Common Overlap of Three Circles , 2006 .

[19]  S. Alpern Infiltration games on arbitrary graphs , 1992 .

[20]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[21]  Miroslav Voznak,et al.  A Survey on Wireless Sensor Networks , 2015 .

[22]  Sajal K. Das,et al.  Security enforcement in wireless sensor networks: A framework based on non-cooperative games , 2006, Pervasive Mob. Comput..

[23]  Micah Adler,et al.  Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.

[24]  Mattia Monga,et al.  A Localization Game in Wireless Sensor Networks , 2010, GameSec.

[25]  P. Hudson Search Games , 1982 .

[26]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[27]  Michael R. Lyu,et al.  A Novel Coalitional Game Model for Security Issues in Wireless Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[28]  Radha Poovendran,et al.  Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , 2006, Advances in Information Security.

[29]  N. J. A. Sloane,et al.  The On-Line Encyclopedia of Integer Sequences , 2003, Electron. J. Comb..

[30]  Mani B. Srivastava,et al.  The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.

[31]  Sajal K. Das,et al.  Preventing DoS attack in sensor networks: a game theoretic approach , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[32]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[33]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[34]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[35]  Srdjan Capkun,et al.  GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[36]  Mihail L. Sichitiu,et al.  Localization in Wireless Sensor Networks: A Probabilistic Approach , 2003, International Conference on Wireless Networks.

[37]  William H. Ruckle,et al.  Ambushing Random Walks I: Finite Models , 1976, Oper. Res..

[38]  Mainak Chatterjee,et al.  Coexistence with malicious nodes: A game theoretic approach , 2009, 2009 International Conference on Game Theory for Networks.